Index of /congress/2004/papers/


../
011 xDash.pdf                                      27-Jun-2005 18:58              168941
012 Natural Language Steganography.pdf             27-Jun-2005 18:49             2727631
013 The Art of Fingerprinting.pdf                  27-Jun-2005 19:01             1124576
014 Feuriges Hacken.pdf                            27-Jun-2005 18:50              508611
015 Sicherheit bei VoIP-Systemen.pdf               27-Jun-2005 18:57               89691
016 Phishing the Web.pdf                           27-Jun-2005 18:44              780944
017 Next Generation Peer to Peer Systems.pdf       27-Jun-2005 18:58             1036568
019 Verdeckte Netzwerkanalyse.pdf                  27-Jun-2005 19:00              729112
023 Ciphire Mail.pdf                               27-Jun-2005 18:50             1008116
026 SAP R3 Protocol Reverse Engineering.pdf        27-Jun-2005 18:36              674753
027 Biometrie in Ausweisdokumenten.pdf             27-Jun-2005 18:36              343408
029 Robocup.pdf                                    27-Jun-2005 18:43             3383682
037 GNOME Anwendungsentwicklung.pdf                27-Jun-2005 18:52              836784
038 Free Software Usage in South America.pdf       27-Jun-2005 18:45              582407
039 Squeak and Croquet.pdf                         27-Jun-2005 18:53             1013352
040 Firewall Piercing.pdf                          27-Jun-2005 18:59             1986489
041 Einfuehrung in Kryptographische Methoden.pdf   27-Jun-2005 18:35               99923
042 Cored Programming.pdf                          27-Jun-2005 18:44              200864
044 Machine Learning in Science and Engineering..> 27-Jun-2005 18:39             4457685
045 Internet Censorship in China.pdf               27-Jun-2005 18:52              588372
046 Tollcollect.pdf                                27-Jun-2005 18:57             1181579
047 Datamining the NSA.pdf                         27-Jun-2005 18:49               29103
049 Zufallszahlengeneratoren.pdf                   27-Jun-2005 18:37              497067
051 Recent features to OpenBSD-ntpd and bgpd.pdf   27-Jun-2005 18:50              919542
052 Die Ueblichen Verdaechtigen.pdf                27-Jun-2005 18:34               48174
053 Enforcing the GNU GPL.pdf                      27-Jun-2005 18:35               78925
055 CCC-Jahresrueckblick.pdf                       27-Jun-2005 18:44              101106
056 LiberTOS.pdf                                   27-Jun-2005 18:36              201508
057 SUN Bloody Daft Solaris Mechanisms.pdf         27-Jun-2005 18:50              118637
058 The Blinking Suspects.pdf                      27-Jun-2005 18:38             1130291
059 Wikipedia Sociographics.pdf                    27-Jun-2005 18:38             3181700
060 Digital Prosthetics.pdf                        27-Jun-2005 18:40              349245
062 Hacking EU funding for a FOSS project.pdf      27-Jun-2005 18:36              774393
063 Edit This Page.pdf                             22-Oct-2005 01:41             1374951
064 Trusted Computing.pdf                          27-Jun-2005 18:47             1075109
065 Grundlagen des Compilerdesign.pdf              27-Jun-2005 18:41             1289526
066 Bluetooth Hacking.pdf                          27-Jun-2005 18:49              362135
067 Inside PDF.pdf                                 27-Jun-2005 18:35              118144
068 NOC Overview.pdf                               27-Jun-2005 18:34             1230562
070 Fnord-Jahresrueckblick.pdf                     27-Jun-2005 18:57             3579855
072 The Reality of Network Address Translators.pdf 27-Jun-2005 19:00               65452
077 Weird Programming 2.pdf                        27-Jun-2005 18:46             2309576
078 Aspects of Elliptic Curve Cryptography.pdf     27-Jun-2005 18:36              425566
079 AVG aint vector graphics.pdf                   27-Jun-2005 18:50             3125101
080 USB-Unbekannter Serieller Bus.pdf              27-Jun-2005 18:54              995983
081 Quantenmechanik fuer Nicht Physiker.pdf        27-Jun-2005 18:56             1557658
083 Quanteninformationstheorie fuer Nicht Physi..> 27-Jun-2005 19:01             1362219
095 Security Nightmares 2005.pdf                   27-Jun-2005 19:01               89964
097 Das Literarische Code-Quartett.pdf             27-Jun-2005 18:45              933646
098 Portable Software-Installation with pkg sou..> 27-Jun-2005 18:40              267751
099 GPL fuer Anfaenger.pdf                         27-Jun-2005 18:36              275136
100 Anonymous communications.pdf                   27-Jun-2005 18:49               85476
101 XMPP - Jabber.pdf                              27-Jun-2005 18:35               94446
105 Honeypot Forensics.pdf                         22-Oct-2005 16:20              684572
107 Embedded Devices as an attack vector.pdf       27-Jun-2005 19:00              305039
108 The Convergence of Anti-Counterfeiting and ..> 27-Jun-2005 18:36             1976421
109 Anti-Honeypot Techniques.pdf                   27-Jun-2005 18:54             1325955
110 Applied Data Mining.pdf                        27-Jun-2005 18:41              223806
111 The Kernel Accelerator Device.pdf              27-Jun-2005 18:57              228927
113 Automated Hacking via Google.pdf               27-Jun-2005 18:42               80306
114 Der 2. Korb der Urheberrechtsnovelle.pdf       27-Jun-2005 18:42              389322
115 The Fiasco Kernel.pdf                          27-Jun-2005 18:37              759774
117 Kampagne Fair Sharing.pdf                      27-Jun-2005 18:51              150153
118 Verified Fiasco.pdf                            27-Jun-2005 18:40             1656713
120 Softwarepatente - Ruestzeug zur Debatte.pdf    27-Jun-2005 18:46              152810
121 Black Ops of DNS.pdf                           27-Jun-2005 18:55             3836727
122 Enforcement of Intellectual Property Rights..> 22-Oct-2005 14:11               79968
123 Gentoo Hardened.pdf                            27-Jun-2005 18:49              201802
125 Old Skewl Hacking Infra Red.pdf                27-Jun-2005 19:00             5117690
126 Apache Security.pdf                            27-Jun-2005 18:57             1879308
127 Security Frameworks.pdf                        27-Jun-2005 18:57              105108
129 Die Propagandawueste des realen Krieges.pdf    27-Jun-2005 18:43               96317
130 Physical Security.pdf                          27-Jun-2005 18:51             1693263
131 Learning OpenPGP by Example.pdf                27-Jun-2005 18:47              294649
134 Secure Instant Messaging.pdf                   27-Jun-2005 18:58              123645
135 Voting Machine Technology.pdf                  27-Jun-2005 18:57               84893
136 Hacking Linux-Powered Devices.pdf              27-Jun-2005 18:45             2710353
140 A Fat Girls Intimate Perspective on Hacker ..> 27-Jun-2005 18:58             2810743
146 Mehr Sicherheit fuer HostAP-WLANs.pdf          27-Jun-2005 18:44              671820
151 Side Channel Analysis of Smart Cards.pdf       22-Oct-2005 19:20             1583423
153 Suchmaschinenpolitik.pdf                       27-Jun-2005 18:34             3476891
158 How to find anything on the web.pdf            27-Jun-2005 19:00             2199728
159 State of Emergent Democracy.pdf                27-Jun-2005 18:50              497689
163 SPAM Workshop.pdf                              27-Jun-2005 18:57               44904
165 Softwarepatente - Der Tag danach.pdf           27-Jun-2005 18:47              926839
168 Spampolitik.pdf                                27-Jun-2005 18:59             1834245
176 Passive covert channels in the Linux kernel..> 27-Jun-2005 18:47             1526734
178 Humanoid Robots.pdf                            27-Jun-2005 18:44             2617188
183 Tor.pdf                                        27-Jun-2005 18:49             3469276
187 Einfuehrung in die Rastersondenmikroskopie.pdf 27-Jun-2005 18:54             1059417
207 Amateurfunk.pdf                                27-Jun-2005 19:01             1817004
208 GameCube Hacking.pdf                           22-Oct-2005 14:42             1733764
213 Haskell.pdf                                    27-Jun-2005 18:36              697400
214 Kryptographie in Theorie und Praxis.pdf        22-Oct-2005 16:58              935475
216 Hacking The Genome.pdf                         27-Jun-2005 18:41             1745349
218 Practical MacOS X Insecurities.pdf             27-Jun-2005 18:59              170753
232 Positionsbezogene Ad-hoc Kollaboration uebe..> 27-Jun-2005 18:43             3250459
242 Weird Programming 1.pdf                        27-Jun-2005 18:35             1117350
244 High Speed Computing with FPGAs.pdf            27-Jun-2005 18:51              144722
246 RFID Technologie und Implikationen.pdf         27-Jun-2005 18:44              887166
250 Lightning Talk-NetBSD Status Report.pdf        27-Jun-2005 18:57              667031
253 Pixels want to be many.pdf                     27-Jun-2005 18:57               50129
255 Pixels want to talk.pdf                        27-Jun-2005 18:47             1250445
271 Hidden Data in Internet Published Documents..> 27-Jun-2005 18:35             3303556
272 Sicherheitsmanagement.pdf                      27-Jun-2005 18:51              487396
273 Crashkurs Mathematik am Beispiel Biometrie.pdf 27-Jun-2005 18:59              579848
274 Praktische Anleitung zum Bau eines Radiosen..> 27-Jun-2005 18:51              146717
277 Das Programmiersystem Forth.pdf                27-Jun-2005 18:40              777358
278 TKUeV-Das Ohr am Draht.pdf                     27-Jun-2005 18:58              206555
289 Mixing VJing and Post-Production.pdf           27-Jun-2005 18:49               87752
306 Ruby.pdf                                       27-Jun-2005 18:44              374584
308 MD5 To Be Considered Harmful Someday.pdf       27-Jun-2005 18:58              157380
310 Information-Wissen-Macht.pdf                   22-Oct-2005 16:44             3832148
313 Biometrie als datenschutzrechtliches Proble..> 27-Jun-2005 19:01              107377
315 Fight for your Right to Fileshare.pdf          27-Jun-2005 18:48              652535
316 Bericht von den BigBrotherAwards.pdf           27-Jun-2005 18:46              300198
317 Unsicherheit von Personal Firewalls.pdf        27-Jun-2005 18:35              296090